Static task
static1
Behavioral task
behavioral1
Sample
528d8d0e6714bfb6d34392e3b1f099d0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
528d8d0e6714bfb6d34392e3b1f099d0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
528d8d0e6714bfb6d34392e3b1f099d0_JaffaCakes118
-
Size
80KB
-
MD5
528d8d0e6714bfb6d34392e3b1f099d0
-
SHA1
a8bb0218dbc4d5b036252919849ca8311d37ce04
-
SHA256
9dcf87f0df91851230457b64fad6b0fa75f0a8388451d30bf9f571bded5d77c3
-
SHA512
109d8c030f660a2b2fcd982b13501a5a3549194b7a2cfcfd2b17c86b8d3778bd4a03c27522ce180f147e9773d8f7918bb7b65f0e915d99cc8e688fbb94ba980d
-
SSDEEP
1536:aq9BUHa+SlanwGtYA/dtKfm8hzR6DMAgEas8l6R:aq9+o0nXtDdcf1hdqrKe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 528d8d0e6714bfb6d34392e3b1f099d0_JaffaCakes118
Files
-
528d8d0e6714bfb6d34392e3b1f099d0_JaffaCakes118.exe windows:5 windows x86 arch:x86
b28f1e37db3adc1995bf401ca65650b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
ExitWindowsEx
CharPrevA
GetDlgItemTextA
GetWindowLongA
GetDesktopWindow
DispatchMessageA
SendMessageA
PeekMessageA
GetDlgItem
SetWindowLongA
GetWindowRect
LoadStringA
EnableWindow
EndDialog
SetDlgItemTextA
CallWindowProcA
MsgWaitForMultipleObjects
ShowWindow
MessageBoxA
GetDC
CharNextA
ReleaseDC
SendDlgItemMessageA
MessageBeep
CharUpperA
SetWindowPos
SetWindowTextA
DialogBoxIndirectParamA
SetForegroundWindow
advapi32
RegCloseKey
CryptGetHashParam
RegQueryValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDestroyHash
RegOpenKeyExA
ole32
OleInitialize
CLSIDFromProgID
CoCreateInstance
gdi32
GetStockObject
DeleteObject
CreateFontIndirectA
GetObjectA
kernel32
ReleaseSemaphore
FindNextFileW
GetSystemDefaultLangID
GetFileSize
CreateDirectoryW
SetUnhandledExceptionFilter
DeviceIoControl
CloseHandle
RemoveDirectoryW
GetFileAttributesW
GetTempPathW
GetCurrentThreadId
GetWindowsDirectoryA
CreateSemaphoreA
FindResourceW
IsBadReadPtr
DeleteFileW
GetSystemDirectoryW
FindFirstFileW
GetPrivateProfileIntW
GetVersionExA
GetUserDefaultLangID
ReleaseMutex
CreateFileW
HeapFree
GetTickCount
GetProcessHeap
VirtualUnlock
lstrlenA
LocalFree
GetPrivateProfileStringW
SetFilePointer
QueryPerformanceCounter
OpenFileMappingW
GetSystemTime
SetFileAttributesA
VirtualAlloc
GetTempFileNameW
CreateFileA
SetEndOfFile
GetStartupInfoA
CreateMutexA
UnhandledExceptionFilter
VirtualFree
VirtualLock
LockResource
GetCurrentProcessId
WriteFile
SetLastError
HeapAlloc
InterlockedDecrement
GetSystemTimeAsFileTime
InterlockedIncrement
FindClose
lstrcmpiA
OpenSemaphoreA
GlobalWire
SizeofResource
GetCurrentProcess
ReadFile
GetLastError
MultiByteToWideChar
LoadResource
ntdll
RtlCreateSecurityDescriptor
NtQueryObject
RtlEqualUnicodeString
NtSetSecurityObject
NtQuerySecurityObject
RtlInitUnicodeString
RtlInitAnsiString
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 130KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ